QUESTION 252Lab Simulation Question – ACL-1A network associate is adding security to the configuration of the Corp1 router. The user on host C should be able to use a web browser to access financial information from the Finance Web Server. No other hosts from the LAN nor the Core should be able to use a web browser to access this server. Since there are multiple resources for the corporation at this location including other resources on the Finance Web Server, all other traffic should be allowed.The task is to create and apply an access-list with no more than three statements that will allow ONLY host C web access to the Finance Web Server. No other hosts will have web access to the Finance Web Server. All other traffic is permitted.Access to the router CLI can be gained by clicking on the appropriate host.

All passwords have been temporarily set to “cisco”.The Core connection uses an IP address of 198.18.196.65The computers in the Hosts LAN have been assigned addresses of 192.168.33.1 – 192.168.33.254Host A 192.168.33.1Host B 192.168.33.2Host C 192.168.33.3Host D 192.168.33.4The servers in the Server LAN have been assigned addresses of 172.22.242.17 – 172.22.242.30 The Finance Web Server is assigned an IP address of 172.22.242.23.

Answer:Corp1>enablePassword: cisco

We should create an access-list and apply it to the interface which is connected to the Servers LAN interface, because it can filter out traffic from both Sw-Hosts and Core networks. The Server LAN network has been assigned addresses of 172.22.242.17 – 172.22.242.30 so we can guess the interface connected to them has an IP address of 172.22.242.30 (.30 is the number shown in the figure). Use the “show ip interface brief” command to check which interface has the IP address of 172.22.242.30.

All other traffic is permittedCorp1(config)#access-list 100 permit ip any anyApply this access-list to Fa0/1 interface (outbound direction)

Corp1(config)#interface fa0/1Corp1(config-if)#ip access-group 100 out

Notice: We have to apply the access-list to Fa0/1 interface (not Fa0/0 interface) so that the access-list can filter traffic coming from both the LAN and the Core networks. If we apply access list to the inbound interface we can only filter traffic from the LAN network.In the real exam, just click on host C and open its web browser. In the address box type http://172.22.242.23 to check if you are allowed to access Finance Web Server or not. If your configuration is correct then you can access it.Click on other hosts (A, B and D) and check to make sure you can’t access Finance Web Server from these hosts.Finally, save the configuration

Corp1(config-if)#endCorp1#copy running-config startup-config

This configuration only prevents hosts from accessing Finance Web Server via web but if this server supports other traffic – like FTP, SMTP… then other hosts can access it, too.Notice: In the real exam, you might be asked to allow other host (A, B or D) to access the Finance Web Server so please read the requirement carefully.

Modification #1A network associate is adding security to the configuration of the Corp router. The user on host B should be able to access the Finance Web Server. Host B should be denied to access other server on S1-SRVS network. Since there are multiple resources for the corporation at this location including other resources on the Finance Web Server, all other traffic should be allowed.The task is to create and apply a numbered access-list with no more than three statements that will allow ONLY host B access to the Finance Web Server. Deny host B from accessing the other servers. All other traffic is permitted.

Modification #2A network associate is adding security to the configuration of the Corp1 router. The user on host C should be able to access the Finance Web Server. No other hosts from the LAN nor the Core should be able access this server. All other traffic should be allowed.The task is to create and apply a numbered access-list with no more than three statements that will allow ONLY host C access the Finance Web Server. No other hosts will have access to the Finance Web Server. All other traffic is permitted.

Modification #3A network associate is adding security to the configuration of the Corp1 router. The user on host C should be able to use a web browser to access financial information from the Finance Web Server. Other access from host C to Finance Web Server should be denied. No other hosts from the LAN nor the Core should be able to access the Finance Web Server. All other traffic should be allowed.The task is to create and apply a numbered access-list with no more than three statements that will allow ONLY host C web access to the Finance Web Server. Also host C should be denied to access any other services of Finance Web Server. No other hosts will access to the Finance Web Server. All other traffic is permitted.access-list 100 permit tcp host 192.168.33.3 host 172.22.242.23 eq 80access-list 100 deny ip any host 172.22.242.23access-list 100 permit ip any any

Modification #4A network associate is adding security to the configuration of the Corp1 router. The user on host D should be able to use a web browser to access financial information from the Finance Web Server. Other access from host C to Finance Web Server should be denied. No other hosts from the LAN nor the Core should be able to access the Finance Web Server. All hosts from the LAN nor the Core should able to access public web server.

The task is to create and apply a numbered access-list with no more than three statements that will allow ONLY host D should be able to use a web browser(HTTP)to access the Finance Web Server. Other types of access from host D to the Finance Web Server should be blocked. All access from hosts in the Core or local LAN to the Finance Web Server should be blocked. All hosts in the Core and local LAN should be able to access the Public Web Server.

The question does not ask about ftp traffic so we don’t care about the two first lines. The 3rd line denies all telnet traffic and the 4th line allows icmp traffic to be sent (ping). Remember that the access list 104 is applied on the inbound direction so the 5th line “access-list 104 deny icmp any any echo-reply” will not affect our icmp traffic because the “echo-reply” message will be sent over the outbound direction.

QUESTION 257Hotspot Question

What would be the effect of issuing the command ip access-group 114 in to the fa0/0 interface?

A. Attempts to telnet to the router would fail.B. It would allow all traffic from the 10.4.4.0 network.C. IP traffic would be passed through the interface but TCP and UDP traffic would not.D. Routing protocol updates for the 10.4.4.0 network would not be accepted from the fa0/0 interface.

Answer: BExplanation:From the output of access-list 114: access-list 114 permit ip 10.4.4.0 0.0.0.255 any we can easily understand that this access list allows all traffic (ip) from 10.4.4.0/24 network

QUESTION 258Hotspot Question

What would be the effect of Issuing the command ip access-group 115 in on the s0/0/1 interface?

A. No host could connect to RouterC through s0/0/1.B. Telnet and ping would work but routing updates would fail.C. FTP, FTP-DATA, echo, and www would work but telnet would fail.D. Only traffic from the 10.4.4.0 network would pass through the interface.

Answer: AExplanation:First let’s see what was configured on interface S0/0/1:

QUESTION 259Refer to the exhibit. Based on the information given, which switch will be elected root bridge and why?

A. Switch A, because it has the lowest MAC addressB. Switch A, because it is the most centrally located switchC. Switch B, because it has the highest MAC addressD. Switch C, because it is the most centrally located switchE. Switch C, because it has the lowest priorityF. Switch D, because it has the highest priority

Answer: E

QUESTION 260Lab Simulation Question – EIGRP

Answer:First we should check the configuration of the ENG Router.Click the console PC “F” and enter the following commands.

Some Modification in QuestionAfter adding ENG router, no routing updates are being exchanged between MGT and the new location. All other inter connectivity for the existing locations of the company are working properly. But Internet connection for existing location including Remote1 and Remote2 networks are not working.Faults Identified:1. Incorrect Autonomous System Number configured in ENG router.2. MGT router does not advertise route to the new router ENG.3. Internet Connection is not working all stations.We need to correct the above two configuration mistakes to have full connectivity

Steps:1. ENG Router: Change the Autonomous System Number of ENG2. Perimiter Router: Add the network address of interface of Permiter that link between MGT and ENG.3. Perimiter Router: Add default route and default-network.

Check the IP Address of S1/0 interface of MGT Router using show running-config command. (The interfaced used to connect to the ISP)!interface Serial1/0ip address 198.0.18.6 255.255.255.252!

For Internet sharing we have create a default route, and add default-network configuration. The IP address is 198.0.18.6/30. Then the next hop IP will be 198.0.18.5.

Important:If you refer the topology and IP chart, the MGT router uses Fa0/0 to connect ENG router, S0/0 used to connect Remote1, and S0/1 used to connect Remote2.

Refer to the command show running-config, the command #PASSIVE-INTERFACE <Interface Name> will deny EIGRP updates to specified interface. In that case we need to use #no passive-interface <Interface Name> to allow the routing updates to be passed to that interface. For example when used the #show run command and we see the output like below.!router eigrp 22network 192.168.77.0network 192.168.60.0passive-interface FastEthernet 0/0passive-interface Serial 1/0no auto-summary!

Also MGT router connect to the ISP router using Serial 1/0. If you seen passive-interface s1/0, then do not remove it using #no passive-interface s1/0 command.

QUESTION 261Lab Simulation Question – CLICentral Florida Widgets recently installed a new router in their office. Complete the network installation by performing the initial router configurations and configuring R1PV2 routing using the router command line interface (CLI) on the RC.Configure the router per the following requirements:

– Name of the router is R2– Enable.secret password is cisco– The password to access user EXEC mode using the console is cisco2– The password to allow telnet access to the router is cisco3

Step 8:Need to enable RIPv2 on router and advertise its directly connected networks

R2(config)#router rip

To enable RIP v2 routing protocol on router use the command version 2

R2(config-router)#version 2

Optional: no auto-summary (Since LAB networks do not have discontinuous networks)RIP v2 is classless, and advertises routes including subnet masks, but it summarizes routes by default.So the first things we need to do when configuring RIP v2 is turn off auto-summarization with the router command no auto-summary if you must perform routing between disconnected subnets.

Comment: To permit ip protocol from any source to access any destination because of the implicit deny any any statement at the end of ACL.

Corp1(config)#access-list 100 permit ip any any

Applying the ACL on the InterfaceComment: Check show ip interface brief command to identify the interface type and number by checking the IP address configured.

Corp1(config)#interface fa 0/1

If the ip address configured already is incorrect as well as the subnet mask. this should be corrected in order ACL to work type this commands at interface mode :no ip address 192.x.x.x 255.x.x.x (removes incorrect configured ipaddress and subnet mask) Configure Correct IP Address and subnet mask:ip address 172.22.242.30 255.255.255.240 ( range of address specified going to server is given as 172.22.242.17 – 172.22.242.30 )Comment: Place the ACL to check for packets going outside the interface towards the finance web server.

Corp1(config-if)#ip access-group 100 outCorp1(config-if)#end

Important: To save your running config to startup before exit.

Corp1#copy running-config startup-config

Verifying the Configuration:Step1: show ip interface brief command identifies the interface on which to apply access list. Step2: Click on each host A,B,C & D . Host opens a web browser page , Select address box of the web browser and type the ip address of finance web server(172.22.242.23) to test whether it permits /deny access to the finance web Server .Step 3: Only Host C (192.168.33.3) has access to the server . If the other host can also access then maybe something went wrong in your configuration . check whether you configured correctly and in order.Step 4: If only Host C (192.168.33.3) can access the Finance Web Server you can click on NEXT button to successfully submit the ACL SIM.

Step1: show ip interface brief command identifies the interface on which to apply access list. Step2: Click on each host A,B,C & D. Host opens a web browser page, Select address box of the web browser and type the ip address of finance web server(172. 22. 242. 23) to test whether it permits /deny access to the finance web Server.Step 3: Only Host C (192.168. 33. 3) has access to the server. If the other host can also access then maybe something went wrong in your configuration check whether you configured correctly and in order.Step 4: If only Host C (192.168. 33. 3) can access the Finance Web Server you can click on NEXT button to successfully submit the ACL SIM.

QUESTION 265Lab Simulation Question – NAT-1

A network associate is configuring a router for the weaver company to provide internet access. The ISP has provided the company six public IP addresses of 198.18.184.105 198.18.184.110. The company has 14 hosts that need to access the internet simultaneously. The hosts in the company LAN have been assigned private space addresses in the range of 192.168.100.17 ?192.168.100.30.

Answer:The company has 14 hosts that need to access the internet simultaneously but we just have 6 public IP addresses from 198.18.184.105 to 198.18.184.110/29.Therefore we have to use NAT overload (or PAT)Double click on the Weaver router to open it

Router>enableRouter#configure terminal

First you should change the router’s name to Weaver

Router(config)#hostname Weaver

Create a NAT pool of global addresses to be allocated with their netmask.Weaver(config)#ip nat pool mypool 198.18.184.105 198.18.184.110 netmask 255.255.255.248

Create a standard access control list that permits the addresses that are to be translated

Weaver(config)#access-list 1 permit 192.168.100.16 0.0.0.15

Establish dynamic source translation, specifying the access list that was defined in the prior step

Weaver(config)#ip nat inside source list 1 pool mypool overload

This command translates all source addresses that pass access list 1, which means a source address from 192.168.100.17 to 192.168.100.30, into an address from the pool named mypool (the pool contains addresses from 198.18.184.105 to 198.18.184.110)Overload keyword allows to map multiple IP addresses to a single registered IP address (many-to-one) by using different portsThe question said that appropriate interfaces have been configured for NAT inside and NAT outside statements.This is how to configure the NAT inside and NAT outside, just for your understanding:

Check your configuration by going to “Host for testing” and type:C :\>ping 192.0.2.114

The ping should work well and you will be replied from 192.0.2.114

QUESTION 266Lab Simulation Question – NAT-2A network associate is configuring a router for the Weaver company to provide internet access. The ISP has provided the company six public IP addresses of 198.18.184.105 – 198.18.184.110. The company has 14 hosts that need to access the internet simultaneously. The hosts in the company LAN have been assigned private space addresses in the range of 192.168.100.17 – 192.168.100.30.

The following have already been configured on the router:

The basic router configurationThe appropriate interfaces have been configured for NAT inside and NAT outsideThe appropriate static routes have also been configured (since the company will be a stub network, no routing protocol will be required.)All passwords have been temporarily set to “cisco”

The task is to complete the NAT configuration using all IP addresses assigned by the ISP to provide internet access for the hosts in the weaver LAN. Functionality can be tested by clicking on the host provided for testing.

We can verify the answer by pinging the ISP IP Address (192.0.2.114) from Host for testing.

Click “Host for testing”

In command prompt, type “ping 192.0.2.114”. If ping succeeded then the NAT is working properly.

Screen Shots:

QUESTION 267In a switched environment, what does the IEEE 802.1Q standard describe?

A. the operation of VTPB. a method of VLAN trunkingC. an approach to wireless LAN communicationD. the process for root bridge selectionE. VLAN pruning

Answer: BExplanation:A broadcast domain must sometimes exist on more than one switch in the network. To accomplish this, one switch must send frames to another switch and indicate which VLAN a particular frame belongs to. On Cisco switches, a trunk link is created to accomplish this VLAN identification. ISL and IEEE 802.1Q are different methods of putting a VLAN identifier in a Layer 2 frame. The IEEE 802.1Q protocol interconnects VLANs between multiple switches, routers, and servers. With 802.1Q, a network administrator can define a VLAN topology to span multiple physical devices.Cisco switches support IEEE 802.1Q for FastEthernet and Gigabit Ethernet interfaces. An 802.1Q trunk link provides VLAN identification by adding a 4-byte tag to an Ethernet Frame as it leaves a trunk port.

QUESTION 268What are three benefits of GLBP? (Choose three.)

A. GLBP supports up to eight virtual forwarders per GLBP group.B. GLBP supports clear text and MD5 password authentication between GLBP group members.C. GLBP is an open source standardized protocol that can be used with multiple vendors.D. GLBP supports up to 1024 virtual routers.E. GLBP can load share traffic across a maximum of four routers.F. GLBP elects two AVGs and two standby AVGs for redundancy.

A. The virtual IP address and virtual MA+K44C address are active on the HSRP Master router.B. The HSRP default timers are a 3 second hello interval and a 10 second dead interval.C. HSRP supports only clear-text authentication.D. The HSRP virtual IP address must be on a different subnet than the routers’ interfaces on the same LAN.E. The HSRP virtual IP address must be the same as one of the router’s interface addresses on the LAN.F. HSRP supports up to 255 groups per interface, enabling an administrative form of load balancing.

Answer: ABFExplanation:The virtual MAC address of HSRP version 1 is 0000.0C07.ACxx, where xx is the HSRP group number in hexadecimal based on the respective interface. For example, HSRP group 10 uses the HSRP virtual MAC address of 0000.0C07.AC0A. HSRP version 2 uses a virtual MAC address of 0000.0C9F.FXXX (XXX: HSRP group in hexadecimal)

A. Utilizing Syslog improves network performance.B. The Syslog server automatically notifies the network administrator of network problems.C. A Syslog server provides the storage space necessary to store log files without using router disk space.D. There are more Syslog messages available within Cisco IOS than there are comparable SNMP trap messages.E. Enabling Syslog on a router automatically enables NTP for accurate time stamping.F. A Syslog server helps in aggregation of logs and alerts.

Answer: CDF

QUESTION 271A network administrator enters the following command on a router: logging trap 3. What are three message types that will be sent to the Syslog server? (Choose three.)

Answer: BExplanation:The “service timestamps debug” command configures the system to apply a time stamp to debugging messages. The time-stamp format for datetime is MMM DD HH:MM:SS, where MMM is the month, DD is the date, HH is the hour (in 24-hour notation), MM is the minute, and SS is the second. With the additional keyword msec, the system includes milliseconds in the time stamp, in the format HH:DD:MM:SS.mmm, where .mmm is milliseconds

QUESTION 274Refer to the exhibit. What is the cause of the Syslog output messages?

A. The EIGRP neighbor on Fa0/1 went down due to a failed link.B. The EIGRP neighbor connected to Fa0/1 is participating in a different EIGRP process, causing the adjacencyto go down.C. A shut command was executed on interface Fa0/1, causing the EIGRP adjacency to go down.D. Interface Fa0/1 has become error disabled, causing the EIGRP adjacency to go down.

Answer: C

QUESTION 275What are three components that comprise the SNMP framework? (Choose three.)